In the Linux kernel, the following vulnerability has been resolved:
PCI: mt7621: Add sentinel to quirks table
Current driver is missing a sentinel in the struct soc_device_attribute
array, which causes an oops when assessed by the
soc_device_match(mt7621_pcie_quirks_match) call.
This was only exposed once the CONFIG_SOC_MT7621 mt7621 soc_dev_attr
was fixed to register the SOC as a device, in:
commit 7c18b64bba3b ("mips: ralink: mt7621: do not use kzalloc too early")
Fix it by adding the required sentinel.
References
Configurations
Configuration 1 (hide)
|
History
25 Oct 2024, 20:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/19098934f910b4d47cb30251dd39ffa57bef9523 - Patch | |
References | () https://git.kernel.org/stable/c/3e9c395ef2d52975b2c2894d2da09d6db2958bc6 - Patch | |
References | () https://git.kernel.org/stable/c/a4997bae1b5b012c8a6e2643e26578a7bc2cae36 - Patch | |
References | () https://git.kernel.org/stable/c/cb7323ece786f243f6d6ccf2e5b2b27b736bdc04 - Patch |
23 Oct 2024, 15:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 20:15
Updated : 2024-10-25 20:09
NVD link : CVE-2022-48952
Mitre link : CVE-2022-48952
CVE.ORG link : CVE-2022-48952
JSON object : View
Products Affected
linux
- linux_kernel
CWE